• New Consumerization of IT Test Lab Guide: Hyper-V Windows 8 corporate virtual machine on personal computer"

    Out friends in France are currently working intensively on Test Lab Guides for Consumerization of IT. The next one was just released:

    New Consumerization of IT Test Lab Guide: Hyper-V Windows 8 corporate virtual machine on personal computer"

    This is the overview:

    Thinking about Consumerization of IT (CoIT) necessarily leads to some security and management challenges.
    Microsoft has enabled CoIT through many technologies for many years and now helps IT managers face security, compliance and compatibility issues they might deal with and give users access to corporate intellectual property from ubiquitous devices, both managed and unmanaged.
    More specifically, this document deals with the situation where a company would like to put in place a "Bring You Own Device" (BYOD) environment. For that purpose, the document demonstrates how Microsoft technologies such as Windows Server 2012 and Windows 8 can allow to work anywhere with an employee's Windows 8 computer hosting a corporate virtual machine (VM) protected by BitLocker, while enjoying connectivity to his workplace. In such a context, the Windows 8 Client Hyper-V technology and DirectAccess technologies are used to implement this CoIT scenario.
    The guide also provides a mean to automatically build the Windows 8 corporate image and deploy the VM onto the employee personal computer based on the Microsoft Deployment Toolkit 2012 Update 1 (MDT) .
    This document is part of a series of documents on Consumerization of IT, and more especially aims at demonstrating the Hyper-V Windows 8 Enterprise Virtual Machine on personal computer scenario in a logical progression.

    Enjoy

    Roger

  • Security Lessons from Star Wars

    Exactly the right article for a weekend: May the (En)Force(ment) Be With You – Security Lessons from Star Wars

    From applying security policies to DLP and effective user authentication, there are many infosecurity lessons to be learned from the classic space opera. Terry Greer-King of Check Point shows how companies can avoid the Empire's mistakes

    Enjoy reading J

    Roger

  • The Future of Crime

    You should spend 15 minutes on this TED talk – really worth it!!

    http://youtu.be/7_OcyWcNi_Y

    Roger

  • Two Papers on Current Issues

    Trustworthy Computing just released two papers on current issues:

    Determined Adversaries and Targeted Attacks Whitepaper

    This paper shares Microsoft's insights into the threat that Determined Adversaries and Targeted Attacks pose, identifies challenges for organizations seeking to combat this threat category and provides a context for other papers that will directly address each of those.

    http://www.microsoft.com/en-us/download/details.aspx?id=34793

    and

    New MMPC Threat Report on Rootkits Now Available

    Rootkits provide stealth capabilities  to malware. This Microsoft Malware Protection Center threat report examines how attackers use rootkits, how rootkits function on affected computers and recommendations that can help organizations mitigate the risk from rootkits.

    http://www.microsoft.com/en-us/download/details.aspx?id=34797

    Happy reading

    Roger